Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • White Papers // Jun 2014

    Enabling and Protecting the Open Enterprise

    A decade or so ago, security wasn’t nearly as challenging as it is today. Users, data and applications were all centralized in data centers that, in effect, kept them contained within a network perimeter. This eBook outlines how the open enterprise has changed the role of security.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    CA Technologies Automation Platform Enables Tesco to Reach Previously Unattainable Milestones

    Business: Global Fortune 50 retailer Tesco is the third largest merchant in the world; it operates over 3,700 stores internationally and is rapidly expanding its online presence, dominating markets as diverse as motor insurance, home electrical appliances and clothing. Challenge: Tesco needed to accelerate time-to-market, increase efficiency and reduce errors...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Fast and Furious: Best Practise - How to Get To improve your Customer's Experience.

    A smartphone in every pocket and ubiquitous wireless have combined to change the way consumers do pretty much everything. From researching to shopping to buying to communicating about the entire experience in the moment. The challenge for IT is in developing engagement opportunities that make sense on the mobile platform,...

    Sponsored By Century Link & HP

  • White Papers // Jun 2014

    Enterprise encryption architecture

    This white paper Enterprise Encryption Architecture explores data security threats and provides some encryption strategies in order to protect private and confidential information.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Securing and controlling data in the cloud

    The Securing and Controlling Data in the Cloud white paper evaluates the • benefits of cloud computing, • the security challenges posed by the cloud, • provides recommendations to secure and control sensitive data in cloud environments.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Securing Big Data

    This White Paper shows the performance of several benchmark tests of Vormetric Transparent Encryption running on a Cloudera HADOOP system using several different workloads. The overhead is minimal and within acceptable norms of performance vs. security tradeoffs.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Secure sensitive data encryption tech guide

    This report surveys the various encryption approaches for securing data at rest to understand what the technology does along with where each provides an optimal fit. After comparing the various encryption technologies, this paper explains why file level transparent data encryption provides the optimal balance of data type coverage, security,...

    Sponsored By Vormetric

  • White Papers // Jun 2014

    VMware AlwaysOn Workplace Solution for Financial Services

    Exceptional customer interactions result in satisfied customers and long-term engagements. Yet meeting customer expectations can prove difficult—and costly—if frontline employees cannot access critical client data or financial services applications because the data center or their desktop is down. As financial services firms look for ways to increase both customer and...

    Sponsored By VMware

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • White Papers // Jun 2014

    Economizer Modes of Data Center Cooling Systems

    In certain climates, some cooling systems can save over 70% in annual cooling energy costs by operating in economizer mode, corresponding to over 15% reduction in annualized PUE. However, there are at least 17 different types of economizer modes with imprecise industry definitions making it difficult to compare, select, or...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Considerations for Owning vs. Outsourcing Data Center Physical Infrastructure

    When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing, however, this paper demonstrates that the economics may be...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Fundamentals of Managing the Data Center Life Cycle for Owners

    Just as good genes do not guarantee health and well-being, a good design alone does not ensure a data center is well-built and will remain efficient and available over the course of its life span. For each phase of the data center’s life cycle, proper care and action must be...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    The Use of Ceiling-Ducted Air Containment in Data Centers

    Ducting hot IT-equipment exhaust to a drop ceiling can be an effective air management strategy, improving the reliability and energy efficiency of a data center. Typical approaches include ducting either individual racks or entire hot aisles and may be passive (ducting only) or active (include fans). This paper examines available...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Classification of Data Center Infrastructure Management (DCIM) Tools

    Data centers today lack a formal system for classifying software management tools. As a result, confusion exists regarding which management systems are necessary and which are optional for secure and efficient data center operation. This paper divides the realm of data center management tools into four distinct subsets and compares...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Osterman Report: Office 365 for the Enterprise

    Osterman Research outlines how third parties are required to strengthen security, compliance and control.

    Sponsored By Mimecast

  • White Papers // May 2014

    A Cohesive Approach to a Complex Market

    The mobile enterprise is becoming more complex with the consumerization of IT, the mobile app explosion and cloud computing. In this report, IDC covers key trends and what companies should look for in a partner that can help them manage it all.

    Sponsored By SAP

  • White Papers // May 2014

    Transform Your Future with Predictive Insight

    Learn how to take advantage of in-memory technology to reduce the time and cost of data processing and perform predictive analyses against vast data volumes. You can design complex models and visualize, discover, and share insights – and do it in real time by harnessing the power of SAP HANA...

    Sponsored By SAP

  • White Papers // May 2014

    SAP Enterprise Mobility: Bringing a Cohesive Approach to a Complex Market

    Social, mobile, big data, and cloud technologies are creating complexity for the enterprise, but embracing the changes associated with this third "wave" of IT can lead to more productive mobile workers as well as better communications with employees, partners, and customers. The trends in the enterprise mobility landscape drive a...

    Sponsored By SAP

  • White Papers // May 2014

    Driving Business Innovation with a New Generation

    Every industry that is dependent on information technology (IT) is in the midst of a major transition brought about by the combination of four primary forces. These four forces make up the 3rd Platform for business applications, succeeding client/server (2nd Platform) and mainframes (1st Platform). The 3rd Platform takes applications...

    Sponsored By SAP

  • White Papers // May 2014

    IT Simplification with the SAP HANA Platform

    The future of business is being reshaped. The convergence of cloud, mobile, social, and Big Data technologies is empowering individuals like never before. At a time when technology is being used to help make everything smarter, faster, and simpler, organizations need to master these technologies in order to meet customer...

    Sponsored By SAP

  • White Papers // May 2014

    Real-Time Insights to Forge Deeper Relationships with Your Customers

    The next step in the evolution of SAP HANA is becoming the foundation for a new generation of real-time applications such as SAP Customer Engagement Intelligence. This application enables highly targeted marketing campaigns and fosters deeper relationships with customers, giving you a better understanding of their needs.

    Sponsored By SAP

  • White Papers // May 2014

    Real-Time Business Demo Tool

    Our interactive Real-Time Business Demo Tool demonstrates the new user experience of the SAP Business Suite software, powered by the SAP HANA platform, which delivers instant insight to all lines of business.

    Sponsored By SAP

  • White Papers // May 2014

    EMC VNXe: Enterprise Features, Entry-level Simplicity

    The need for advanced IT capabilities isn’t limited to big companies. Competent IT is an important philosophy these days, and organizations of all sizes are coming to depend on the functional capability, good economic value, and the competitive advantage that technology can provide. EMC’s new VNXe provides functional capabilities typically...

    Sponsored By EMC

  • White Papers // May 2014

    Why Data Domain: Slow backups got you down?

    Traditional backups are just too slow, inefficient and unreliable for the typical data centre of today. If it’s bad now, it’s only going to get worse with more severs and more data to protect. Someone once said, the definition of insanity is continuing to do the same thing over and...

    Sponsored By EMC

  • Videos // May 2014

    Video: Workday's Mobile Solutions for iPad

    As the workforce around the world becomes more mobile, enterprises are enabling their workers to stay informed and connected while on the go. Watch the video to discover how Workday I empowering today’s workforce with cloud-based mobile solutions that can be easily deployed on your iPad®.

    Sponsored By Workday

  • White Papers // May 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • Videos // May 2014

    The Fast, Simple, Scalable and Complete Storage Solution

    Learn how GPFS accelerates data intensive work flows and lowers storage costs in Life Sciences, Energy Exploration, Government, Media & Entertainment and Financial Services by removing data related bottlenecks, simplifying data management at scale, empowering global collaboration, managing the full data life cycle cost effectively and ensuring end-to-end data availability,...

    Sponsored By IBM

  • Downloads // May 2014

    Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

    Sponsored By SolarWinds

  • White Papers // May 2014

    Info-Tech Vendor Landscape: Intrusion Detection and Prevention Systems

    In this analyst report, Info-Tech detail out how the vendor landscape and how to reduce risks to critical systems and data with IDPS-enabled visibility and responsiveness. IBM can be found in the champion zone of the landscape.

    Sponsored By IBM

  • White Papers // May 2014

    What's Behind a Cyberattack?

    IBM Security QRadar Incident Forensics provides a next-generation approach to security incident forensics that supports network security, insider threat analysis - including fraud and abuse - and the documentation of incident-related evidence.

    Sponsored By IBM

  • White Papers // Apr 2014

    HP HAVEn: See the Big Picture in Big Data

    HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the...

    Sponsored By Hewlett Packard

  • Downloads // Apr 2014

    One Tool that Makes Server & Application Performance Monitoring Simple

    SolarWinds Server & Application Monitor (SAM) gives you the ability to proactively identify problems and isolate the root cause of performance issues. Rather than only responding to problems, fire drills and endless help tickets, stop poor performance before it affects service availability. Four reasons to consider SolarWinds Server & Application...

    Sponsored By SolarWinds

  • White Papers // Apr 2014

    Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Sponsored By IBM

  • White Papers // Apr 2014

    Protect the Mobile Enterprise with Smarter Security

    Provide secure access for mobile users, block unauthorized users and prevent fraud with IBM Security Access Manager for Mobile

    Sponsored By IBM

  • White Papers // Apr 2014

    How to Fill the Threat Management Gateway Void

    The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web. In choosing a new solution, it’s important for decision-makers to ensure that the solution they select includes the features and functionality necessary to ensure safe and...

    Sponsored By F5

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • White Papers // Apr 2014

    Forrester Report: Measuring Mobile Apps

    Developers need to improve their mobile measurement savvy. Many application development professionals have little to no skills in collecting real-time and operational metrics; that’s usually been the province of infrastructure and operations pros. But such thinking is both antiquated and dangerous. As requirements elicitation shifts from long textual requirements documents...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2014

    Preparing Your Network for the Mobile Onslaught.

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

    Sponsored By IBM

  • Videos // Apr 2014

    IT Services to Enable a Mobile Enterprise

    Mobile technology is dramatically changing the way people work and companies do business. Done right, mobile technology can improve efficiencies and reduce costs. But the stakes are high, and solutions can be complex. Watch this video to learn how IBM enterprise mobility services can help you develop an end-to-end mobility...

    Sponsored By IBM

  • Downloads // Apr 2014

    Easy-to-Use & Affordable Remote IT Administration & Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

    Sponsored By SolarWinds